|Publication number||US8185135 B2|
|Application number||US 13/172,706|
|Publication date||May 22, 2012|
|Filing date||Jun 29, 2011|
|Priority date||Sep 25, 2008|
|Also published as||US8073467, US20100075697, US20110256853|
|Publication number||13172706, 172706, US 8185135 B2, US 8185135B2, US-B2-8185135, US8185135 B2, US8185135B2|
|Inventors||Mohit Gupta, Prashanth Mohan, Lenin Ravindranath Sivalingam, Santhosh Kumar|
|Original Assignee||Microsoft Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (21), Non-Patent Citations (35), Classifications (8), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This patent application is a continuation of, and claims priority from, U.S. patent application Ser. No. 12/238,361 filed on Sep. 25, 2008, which is incorporated herein by reference in its entirety.
The introduction of low-cost global positioning system (GPS) units has given rise to a number of location-based services, particularly those that carry a database of points of interest by their map location. The database for an entire country can be stored in the unit and the information retrieved by map location, whether the unit is at that location or not. The database is contained in the GPS unit and may be updated periodically while the GPS unit is connected to an online service, for example, via the Internet while connected to a host computer.
Location-based information systems, however, position the actual data based on location so that notes, blogs, advertisements, and nearby people are made available as a location aware device traverses an area.
However, accurate location information can be difficult to acquire, particularly when in urban canyons or indoors, when using devices without GPS units, or without access to “war driving” databases, that is, a database of WiFi sites noting location by network.
A system for developing and using location information collects information at a server to map wireless landmarks such as cell phone sites and WiFi wireless access points by wireless identifier, as opposed to network name. When a WiFi access point fall within a GSM coverage area, an association may be made between the two regions. Additional WiFi access points may be mapped in relation to known access points and known GSM coverage areas. When in a geographic area, a mobile device location can be identified by the signature of the combination of one or more WiFi access points and the current GSM area that are currently visible. GSM and WiFi access point edges are weighted to account for their relative coverage areas when building the mapping relationships.
While actual geographic locations (e.g. latitude and longitude) may be developed, the system may rely on the relative relationships between wireless landmarks more than their absolute location. Such a system may be easier to deploy because only radio landmark relationships may be recorded without the need for specific geographic (e.g. latitude/longitude) references.
The mapping does not require ‘war driving’ in that locating vulnerable WiFi networks are not required, although war driving data can be used to enhance the wireless landmark relationship network. Because any WiFi access point (AP) will respond with an AP identifier (basic service set identifier or BSSID) when queried, an AP may be cataloged even when connection to its associated network is not allowed.
When accessing location-based data in either a push or pull mode, the mobile device may send a wireless signature of all ‘visible’ wireless landmarks for use by a location service. The location service may resolve the wireless signature to a location and the location may be passed to an application service for geo-located information. The geo-located information may include web logs (blogs), points of interest, reviews, advertising, or even social networking ‘friends’ in the vicinity. Some or all such services may be ‘opt-in’ for personal privacy reasons. In another location-sensitive application, gamers looking for another game partner may be identified by proximity.
The combination of GSM and WiFi in this manner uses less power than GPS solutions and works well in urban canyons. Deployment does not require wireless system operators to change their networks, or even cooperate in the mapping process. While the absolute location, e.g. latitude and longitude, of the wireless landmarks may be cataloged, many of the location-based applications may require only relative location information. For example, a location-based ‘sticky note’ may not require any sense of its absolute location, only that it can be found where it was left.
Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
It should also be understood that, unless a term is expressly defined in this patent using the sentence “As used herein, the term ‘______’ is hereby defined to mean . . . ” or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S.C. §112, sixth paragraph.
Much of the inventive functionality and many of the inventive principles are best implemented with or in software programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present invention, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the principles and concepts of the preferred embodiments.
For the purpose of this patent, a visible wireless landmark means a cellular site or local wireless network access point that is in-range and capable of being identified by site-specific indicia. Recently in range wireless landmarks may also be included as visible in some cases.
The mobile device 12 may be in logically connected, or accessible to, back-end equipment such as an application server 14, which itself may be connected to a location server 16 and an application data store 18. The mobile device 12 may be in coverage of a first cellular network, GSM A 20, and near a second cellular network, GSM B 22. The mobile device 12 may have visibility to two WiFi network access points 24 and 26. Other nearby WiFi ‘hot spots’ may include WiFi clusters 28, 30, and 32, and a single site 34.
The mobile device 12 may be a cellular telephone, a personal digital assistant, a smart phone, etc. The mobile device may include a GPS receiver, but such equipment is not required.
The application and location servers 14 and 16 may be commercially available computers/servers and the application data store 18 may be a standalone storage facility, or may be incorporated in one of the servers. It will be appreciated that may configurations of the back-end equipment are possible, including both location and application functions being served from a single computer. Other configurations may include the application and/or location serving functions being spread across multiple servers, including different geographic regions depending on cost and response requirements.
In operation, a user of the mobile device 12 may wish to tag a location for future reference, either as a note to herself or as a note to others who may follow. The note may be generated on the mobile device 12. Periodically, or in response to the action to generate the note, the mobile device 12 may take an inventory of all available wireless networks/access points that are visible. As illustrated in
The identities wireless landmarks, GSM A 20 site and the two WiFi access points, may be formulated into a wireless signature and forwarded with the note and, in some cases, an action to be taken. The action to be taken may be to post a public note, to post a note restricted to authorized users, or to post a private note, accessible only to the person who created it.
The wireless signature, note, and action (or equivalent information) may be forwarded to the application server 14 over network path 36. The application server 14 may strip out the wireless signature and forward it to the location server 16 via message 38. The location server 16 may use the wireless signature to confirm existing location data or to build out new relationship data about the elements found in the wireless signature. A graph, depicted in
The location server 16 may return location information in the form of a logical location as well as logical distances to other locations on return path 40. The application server 14 may then use the location information as an index to store the note via path 42 onto the data store 18. If requested, the application server 14 may also use the location information to retrieve location-specific data from the data store 18 via path 44 and formatted by the application server 14 to send to the mobile device via return path 46.
The location-specific data may be in several broad categories. The first may be ‘fixed’ data associated with the location, such as sticky notes or photos left previously by the same user, sticky notes or photos left by others, blog spaces, reviews, or paid advertising. The second may be information about others in proximity about whom the user may be interested. In one embodiment, the proximity information may be used to find social networking friends in the area. In another embodiment, the proximity information may be used to avoid contact with undesired persons. Such cases may arise in the case of a protective order where one person is to stay away from another. In this case, a warning may be returned to the mobile device and, optionally, an alert may be sent to the local authorities advising of a potential violation of the protective order. Unlike prior art monitoring systems, this mechanism works on the protected person's location, not just the person's residence or place of business. Proximity calculations using edge values is illustrated in
The graph 50 a representing the logical relationships between radio landmarks shows that GSM C 56 a is connected to each of the other radio landmarks, while GSM D 66 a is connected to only GSM C 56 a and WiFi access point 66 a.
In calculating the relative distance between the two mobile devices 52 and 54, each edge traversed can be assigned a value and all possible traversal paths calculated to find the lowest value path.
In this illustration, cellular-cellular edges may be assigned a value of 10 while WiFi-cellular may be assigned a value of 5 and WiFi-WiFi given a value of 1. To calculate the logical distance from WiFi 60 a to WiFi 66 a, three paths may be calculated:
1: 60 a-56 a-58 a-66 a=5+10+5=20
2: 60 a-56 a-66 a=5+5=10
3: 60 a-62 a-64 a-66 a=1+1+1=3
The shortest logical distance is option 3, with a value of 3. Various applications may use this shortest logical distance as a trigger for activation. For example, a ‘friend finder’ application may notify a user of all friends within a range of 4. Alternatively, a user may be able to set preferences for different applications depending on either the circumstances or the location. For example, a user going to the grocery store before preparing dinner may set the distance to zero (i.e., don't bother me), while a user visiting a foreign country may set the distance to 30 or more.
With reference to
A series of system busses may couple various system components including a high speed system bus 123 between the processor 120, the memory/graphics interface 121 and the I/O interface 122, a front-side bus 124 between the memory/graphics interface 121 and the system memory 130, and an advanced graphics processing (AGP) bus 125 between the memory/graphics interface 121 and the graphics processor 190. The system bus 123 may be any of several types of bus structures including, by way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus and Enhanced ISA (EISA) bus. As system architectures evolve, other bus architectures and chip sets may be used but often generally follow this pattern. For example, companies such as Intel and AMD support the Intel Hub Architecture (IHA) and the Hypertransport™ architecture, respectively.
The computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110.
The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. The system ROM 131 may contain permanent system data 143, such as identifying and manufacturing information. In some embodiments, a basic input/output system (BIOS) may also be stored in system ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processor 120. By way of example, and not limitation,
The I/O interface 122 may couple the system bus 123 with a number of other busses 126, 127 and 128 that couple a variety of internal and external devices to the computer 110. A serial peripheral interface (SPI) bus 126 may connect to a basic input/output system (BIOS) memory 133 containing the basic routines that help to transfer information between elements within computer 110, such as during start-up.
A super input/output chip 160 may be used to connect to a number of ‘legacy’ peripherals, such as floppy disk 152, keyboard/mouse 162, and printer 196, as examples. The super I/O chip 160 may be connected to the I/O interface 122 with a bus 127, such as a low pin count (LPC) bus, in some embodiments. Various embodiments of the super I/O chip 160 are widely available in the commercial marketplace.
In one embodiment, bus 128 may be a Peripheral Component Interconnect (PCI) bus, or a variation thereof, may be used to connect higher speed peripherals to the I/O interface 122. A PCI bus may also be known as a Mezzanine bus. Variations of the PCI bus include the Peripheral Component Interconnect-Express (PCI-E) and the Peripheral Component Interconnect—Extended (PCI-X) busses, the former having a serial interface and the latter being a backward compatible parallel interface. In other embodiments, bus 128 may be an advanced technology attachment (ATA) bus, in the form of a serial ATA bus (SATA) or parallel ATA (PATA).
The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
Removable media, such as a universal serial bus (USB) memory 153, firewire (IEEE 1394), or CD/DVD drive 156 may be connected to the PCI bus 128 directly or through an interface 150. A storage media 154 similar to that described below with respect to
The drives and their associated computer storage media discussed above and illustrated in
The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180 via a network interface controller (NIC) 170. The remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110. The logical connection between the NIC 170 and the remote computer 180 depicted in
In some embodiments, the network interface may use a modem (not depicted) when a broadband connection is not available or is not used. It will be appreciated that the network connection shown is exemplary and other means of establishing a communications link between the computers may be used.
To support the embodiment described, more than one wireless protocol may be supported by the mobile device 400. In this example, a cellular telephone transceiver 426 may be resident with local network transceiver 428. As discussed above, the local network transceiver 428 may include support for a WiFi network, Bluetooth, Infrared, etc. In other embodiments, especially as technology develops, it is envisioned that one device may simultaneously support each of the various wireless protocols employed by the mobile device 400. For example, a software-defined radio may be able to support multiple protocols via downloadable instructions.
In operation, the mobile device 400 may be able to periodically poll for visible wireless network transmitters (radio landmarks), both cellular and local network types on a periodic basis. Such polling may be possible even while normal wireless traffic is being supported on the mobile device. After polling to determine visible radio landmarks, the information may be formatted with other information, when available, and sent to an application service or location service. Because voice/data connections are not necessarily required to determine the presence of radio landmarks, no equipment changes to the radio landmarks are required, and in fact, no permission or access to those networks are required. Because the landmark relationships are primarily used and not their absolute geographic locations, physical scouting and mapping are also not required, although as such information is available, it may easily be incorporated, if desired.
The mobile device 12 may also collect visible local wireless site information. The local wireless sites may include 802.11 local area networks, Bluetooth networks, etc. Because many local wireless networks allow polling to determine what networks are visible, the mobile device 12 may collect access point identifiers for numerous access points.
At block 504, the cellular telephone and local wireless network information may be formatted into a location signature. The location signature may include as many radio landmarks, e.g. cellular telephone site identifiers and local wireless networks, as are available, but may also include signal strength and GPS data, as available. In some cases, previously logged radio landmarks may also be included. For example, if radio landmark surveys are taken every 30 seconds, radio landmarks noted in the last two logging cycles may also be included. This may be the case when there is a low density of radio landmarks.
At block 506, location-specific data may be optionally developed. For example, a user may take a photograph from the location, the user may write a note about the location or a review of a local establishment. The user may respond to a previously retrieved note about the location. The location-specific data may be tagged as to its use. For example, the information may be set to private, so only the user can retrieve it, it may be set to friends, where known parties can access it, or it may be set to public, so that anyone can see it. A location perimeter may also be set, so that the exactness with which the location must be duplicated can be set. Certainly numerous other options exist for both the type of data developed and the accessibility settings.
At block 508, the location signature and any optional location-specific data may be sent to the infrastructure supporting the application, such as an information service or application service. In one embodiment, the architecture of
At block 510, a location server, such as location server 16 of
Of perhaps more interest is the process for pruning dead or moved radio landmarks. The following formula may be used to monitor the health of current radio landmarks.
where A and B are specific radio landmarks, NAB is the total number of times A and B are reported together in the same location signature and NA and NB are the number of times either radio landmark is reported. As can be seen, when the number of reports of the two in the same signature falls, or if both locations are reported separately, a reliability metric will fall and the offending location may be dropped.
At block 512, when enough data is present in the location database, a response to a requesting application may be returned to the requesting application. If data received from the user included location-specific information, such information may be added to the location database and appropriate privacy settings applied, according to user preferences. Depending on the nature of the application, more information about the logical location may be requested. For example, in a “friend finder” application, the location server may be asked to identify all the other logical locations within a radius preference set by the user. Using the example of
At block 514, the information service may retrieve applicable preferences and application data related to previous notes, location-specific blog spaces, acquaintances, advertisements, etc. In one embodiment, the information service may request advertising from a commercial ad server using either location information, key words, or other criteria as advertising keys.
At block 516, the location-specific information, including advertisements, may be returned to the mobile device 12 for consideration by the user. Again, depending on preferences and personal privacy policies, the lists of acquaintances, either desired or undesired, may be returned to the user or to desired ‘friends.’
In another embodiment, the information service may observe when two or more mobile devices travel through a pattern of radio landmarks in unison over a given period of time. The information service may infer a friendship there and ask the user if there are others to be added to a friends list. In one scenario, the traveling partners may be recognized and the new “friends” given appropriate status. In another scenario, one person may not realize another person has been traveling the same path. If this is not desired, the person may increase awareness, report the incident, or take other steps as necessary.
Although the foregoing text sets forth a detailed description of numerous different embodiments of the invention, it should be understood that the scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possibly embodiment of the invention because describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims defining the invention.
Thus, many modifications and variations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US7317705||Dec 17, 2004||Jan 8, 2008||Verizon Business Global Llc||Mobile data device and method of locating mobile data service|
|US20050117781||Oct 12, 2004||Jun 2, 2005||Honda Motor Co., Ltd.||Land mark, land mark detecting apparatus, land mark detection method and computer program of the same|
|US20060265491 *||Aug 22, 2003||Nov 23, 2006||Litwin Louis R||Autologging the presence of a wireless local area network|
|US20070060130 *||Aug 7, 2006||Mar 15, 2007||Aleksandar Gogic||Method and apparatus for creating a fingerprint for a wireless network|
|US20070083428||Oct 12, 2005||Apr 12, 2007||Susanne Goldstein||System and method for navigation by advertising landmark|
|US20070217427||Feb 28, 2007||Sep 20, 2007||Samsung Electronics Co., Ltd.||Method and system for transmitting/receiving data in heterogeneous communication systems|
|US20080032666||Aug 7, 2006||Feb 7, 2008||Microsoft Corporation||Location based notification services|
|US20080034088||Apr 12, 2007||Feb 7, 2008||Narasimha Suresh||System and method for generating user contexts for targeted advertising|
|US20080064393||May 26, 2005||Mar 13, 2008||Paul Oommen||Managing Multimode Roaming Mobile Devices|
|US20080117850||Oct 30, 2007||May 22, 2008||Agrawal Dharma P||Dual Mode Wireless Personal Area Network and Wireless Local Area Network Architecture|
|US20080268816||Apr 26, 2007||Oct 30, 2008||Research In Motion Limited||Predicting user availability from aggregated signal strength data|
|US20090024550 *||Sep 29, 2008||Jan 22, 2009||Devicescape Software, Inc.||Systems and Methods for Wireless Network Selection|
|US20090132941||Nov 9, 2008||May 21, 2009||Geomonkey Inc. Dba Mapwith.Us||Creation and use of digital maps|
|US20090163228||Nov 21, 2008||Jun 25, 2009||Blumberg Brad W||System and method for providing information based on geographic position|
|US20090175239||Jan 7, 2008||Jul 9, 2009||Edward Grinshpun||Method of supporting quality-of-service application session continuity during inter-technology handover using a common packet data function|
|US20090254975||Mar 10, 2006||Oct 8, 2009||Turnbull Rory S||Location Based Authentication|
|US20090322517||Dec 31, 2009||Samsung Electronics Co., Ltd.||Creating dynamic signatures for virtual locations|
|US20100075697||Sep 25, 2008||Mar 25, 2010||Microsoft Corporation||Wifi and gsm landmarks and neighborhoods for location based services|
|US20100268717||Oct 21, 2010||Geomonkey, Inc.||Use of mobile devices for viewing and publishing location-based user information|
|US20110047603 *||Feb 24, 2011||John Gordon||Systems and Methods for Obtaining Network Credentials|
|US20110191253||Aug 4, 2011||Geomonkey, Inc.||Use of mobile devices for communicating sound-based virtual transaction data|
|1||Ashbrook, et al.; "Using GPS to Learn Significant Locations and Predict Movement Across Multiple Users"; Personal and Ubiquitous Computing, Vol. 7, No. 5, Oct. 2003; pp. 275-286.|
|2||Bahl, et al.; "RADAR: An Inbuilding RF-Based User Location and Tracking System"; >; Mar. 26-30, 2000; pp. 10.|
|3||Bahl, et al.; "RADAR: An Inbuilding RF-Based User Location and Tracking System"; <<http://research.microsoft.com/˜padmanab/papers/infocom2000.pdf>>; Mar. 26-30, 2000; pp. 10.|
|4||Bappu, et al.; "Location Based ad hoc Message Propagation Using Wi-Fi and 2G/3G Networks"; Retrieved at >; The Journal of the Communications Network; vol. Part 2; Apr.-Jun. 2007; pp. 12-18.|
|5||Bappu, et al.; "Location Based ad hoc Message Propagation Using Wi-Fi and 2G/3G Networks"; Retrieved at <<http://www.theitp.org/UserData/root/Files/2007Vol6Prt2—02.pdf>>; The Journal of the Communications Network; vol. Part 2; Apr.-Jun. 2007; pp. 12-18.|
|6||Chen, et al.; "Practical Metropolitan-Scale Positioning for GSM Phones"; >; Ubicomp 2006; LNCS 4206; 2006; pp. 225-242.|
|7||Chen, et al.; "Practical Metropolitan-Scale Positioning for GSM Phones"; <<http://www.stanford.edu/˜haehnel/papers/100920061625—366.pdf>>; Ubicomp 2006; LNCS 4206; 2006; pp. 225-242.|
|8||Cui, et al.; "Autonomous Vehicle Positioning with GPS in Urban Canyon Environments"; >; Proceedings of the 2001 IEEE; International Conference on Robotics & Automation; Seoul, Korea; May 21-26, 2001; pp. 1105-1110.|
|9||Cui, et al.; "Autonomous Vehicle Positioning with GPS in Urban Canyon Environments"; <<http://vlab.ee.nus.edu.sg/˜sge/conference/ICRA01-1.pdf>>; Proceedings of the 2001 IEEE; International Conference on Robotics & Automation; Seoul, Korea; May 21-26, 2001; pp. 1105-1110.|
|10||Espinoza, et al.; "GeoNotes: Social and Navigational Aspects of Location-Based Information Systems"; >; UBICOMP 2001; Sep. 30-Oct. 2, 2001; Atlanta, Georgia;; pp. 10.|
|11||Espinoza, et al.; "GeoNotes: Social and Navigational Aspects of Location-Based Information Systems"; <<http://www.sics.se/˜espinoza/documents/GeoNotes—ubicomp—final.htm>>; UBICOMP 2001; Sep. 30-Oct. 2, 2001; Atlanta, Georgia;; pp. 10.|
|12||Guedes, Filipe; "Co-Location of Mobile Devices with Audio and Wireless Interfaces"; Retrieved at >; Nov. 29, 2007; pp.1-4.|
|13||Guedes, Filipe; "Co-Location of Mobile Devices with Audio and Wireless Interfaces"; Retrieved at <<http://paginas.fe.up.pt/˜ee01154/project/docs/progress.report.ee01154.pdf>>; Nov. 29, 2007; pp.1-4.|
|14||Hightower et al.; "Learning and Recognizing the Places We Go"; >; ACM International Conference on Ubiquitous Computing, 2005; pp. 18.|
|15||Hightower et al.; "Learning and Recognizing the Places We Go"; <<http://www.intel-research.net/seattle/pubs/100220060925—330.pdf>>; ACM International Conference on Ubiquitous Computing, 2005; pp. 18.|
|16||Hightower, et al.; "Location Systems for Ubiquitous Computing"; Retrieved at >; Aug. 2001; pp. 57-66.|
|17||Hightower, et al.; "Location Systems for Ubiquitous Computing"; Retrieved at <<http://www.intel-research.net/seattle/pubs/062120021154—45.pdf>>; Aug. 2001; pp. 57-66.|
|18||Johnson, Donald B.; "Efficient Algorithms for Shortest Paths in Sparse Networks"; <<http://delivery.acm.org/10.1145/330000/321993/p1-johnson.pdf?key1=321993&key2=612757121&coll=GUIDE&dl=GUIDE&CFID=39080977&CCFTOKE=95720422>>; Journal of the Association for Computing Machinery; vol. 24, No. 1; Jan. 1977; pp. 1-13.|
|19||Krumm, et al.; "The NearMe Wireless Proximity Server"; >; The Sixth International Conference on Ubiquitous Computing; UbiComp 2004; Sep. 7-10, 2004; Nottingham, England; pp. 283-300.|
|20||Krumm, et al.; "The NearMe Wireless Proximity Server"; <<http://research.microsoft.com/users/kenh/papers/NearMe.pdf>>; The Sixth International Conference on Ubiquitous Computing; UbiComp 2004; Sep. 7-10, 2004; Nottingham, England; pp. 283-300.|
|21||LaMarca, et al.; "Place Lab: Device Positioning Using Radio Beacons in the Wild"; >; 2005; pp. 18.|
|22||LaMARCA, et al.; "Self-Mapping in 802.11 Location Systems";I Retrieved at >; ACM International Conference on Ubiquitous Computing; 2005; pp. 18.|
|23||LaMarca, et al.; "Place Lab: Device Positioning Using Radio Beacons in the Wild"; <<http://www.placelab.org/publications/pubs/pervasive-placelab-2005-final.pdf>>; 2005; pp. 18.|
|24||LaMARCA, et al.; "Self-Mapping in 802.11 Location Systems";I Retrieved at <<http://www.intel-research.net/seattle/pubs/100620061658—353.pdf>>; ACM International Conference on Ubiquitous Computing; 2005; pp. 18.|
|25||Marias, et al.; "An Innovative Gateway for Indoor Positioning"; Retrieved at >; EURASIP Journal on Applied Signal Processing; vol. 2006; Article ID 81714; pp. 1-10.|
|26||Marias, et al.; "An Innovative Gateway for Indoor Positioning"; Retrieved at <<http://www.hindawi.com/GetPDF.aspx?doi=10.1155/ASP/2006/81714>>; EURASIP Journal on Applied Signal Processing; vol. 2006; Article ID 81714; pp. 1-10.|
|27||Marmasse, et al.; "Location-Aware Information Delivery with Commotion"; Retrieved at >; HUC 2000 proceedings; pp. 157-171.|
|28||Marmasse, et al.; "Location-Aware Information Delivery with Commotion"; Retrieved at <<http://alumni.media.mit.edu/˜nmarmas/cmHUC2k.pdf>>; HUC 2000 proceedings; pp. 157-171.|
|29||Otsason, et al.; "Accurate GSM Indoor Localization"; >; UbiComp 2005; LNCS 3660; 2005; pp. 141-158.|
|30||Otsason, et al.; "Accurate GSM Indoor Localization"; <<http://www.placelab.org/publications/pubs/ubicomp2005-indoorGSM.pdf>>; UbiComp 2005; LNCS 3660; 2005; pp. 141-158.|
|31||Schilit, et al.; "Context-Aware Computing Applications"; >; IEEE Workshop on Mobile Computing Systems and Applications, Dec. 8-9 1994; pp. 1-7.|
|32||Schilit, et al.; "Context-Aware Computing Applications"; <<http://sandbox.xerox.com/want/papers/parctab-wmc-dec94.pdf>>; IEEE Workshop on Mobile Computing Systems and Applications, Dec. 8-9 1994; pp. 1-7.|
|33||Smith, Marc A.; "Some Social Implications of Ubiquitous Wireless Networks"; <<http://delivery.acm.org/10.1145/370000/367049/p25-smith.pdf?key1=367049&key2=2532757121&coll=GUIDE&dl=GUIDE&CFID=80443965&CFTOKEN=41566866>>; Mobile Computing and Communications Review; vol. 4, No. 2; Apr. 2000; pp. 25-36.|
|34||Varshavsky, et al.; "Are GSM Phones the Solution for Localization?"; >; HotMobile; 2006; pp. 6.|
|35||Varshavsky, et al.; "Are GSM Phones the Solution for Localization?"; <<http://www.intel-research.net/seattle/pubs/100620061635—346.pdf>>; HotMobile; 2006; pp. 6.|
|U.S. Classification||455/456.3, 455/414.2, 455/456.1, 455/456.6|
|Cooperative Classification||H04W64/00, H04W4/02|
|Dec 9, 2014||AS||Assignment|
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034544/0001
Effective date: 20141014
|Nov 4, 2015||FPAY||Fee payment|
Year of fee payment: 4